therealdreg / emuhookdetectorLinks
hook detector using emulation and comparing static with dynamic outputs
☆17Updated 2 years ago
Alternatives and similar repositories for emuhookdetector
Users that are interested in emuhookdetector are comparing it to the libraries listed below
Sorting:
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 7 years ago
- ☆13Updated 8 years ago
- Kernel Shellcode to add all privileges in token☆15Updated 8 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- Dalvik Header Plugin for IDA Pro☆23Updated 12 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- ☆14Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 10 years ago
- Dynamic binary analysis via platform emulation☆12Updated 7 years ago
- Anti-Anti-Debugger Plugins☆19Updated 12 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- ☆22Updated 8 years ago
- hooking KiUserApcDispatcher☆25Updated 8 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆12Updated 6 years ago
- Zerokit shared code☆17Updated 6 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Updated 11 years ago
- IDA loader module for Hidden Bee's custom executable file format☆20Updated 7 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Updated 11 years ago
- Kernel-mode file scanner☆18Updated 7 years ago
- ☆30Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago